From nobody Thu Apr 25 00:48:46 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1574780558; cv=none; d=zohomail.com; s=zohoarc; b=OuDz//JILlRJoOH8y+g4+rqd3pKEbwdOJ+OdhGJJ7RdyIyZd0G3d027zYroh2t+3s6DbzYqVPFf/cLPYSNBvtl0u49/mRq2c93z7BPjt1hULL7ILLlIishcI1ocHkPkiP8LZiV889COtlpoSa7cAp7ffQonzZPAO8K0vwdqqBIo= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574780558; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=Huf3oYT0winuU63N4Ps4el5HpV0XoXb2yznc6VS6ib4=; b=JZPRYy8zibW0Ax+csKlKBmvVtd6+/opVS210Lg9BjCDBbahRb5RvxE45S8Ozc18oBPu3Qph3B39SBaj/yIoBL3KGrAdkb3i+TBGeOWHoiss+GoWie/7dyTDsP3Nqtk+H+QJLVNPysUnSNfhBA01qlNY8D/SJjGRxu3Dk6Hxz35c= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1574780558401250.0338333554231; Tue, 26 Nov 2019 07:02:38 -0800 (PST) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iZcLD-0004eR-OA; Tue, 26 Nov 2019 15:01:23 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iZcLC-0004dt-EV for xen-devel@lists.xenproject.org; Tue, 26 Nov 2019 15:01:22 +0000 Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 99f68856-105d-11ea-b155-bc764e2007e4; Tue, 26 Nov 2019 15:01:19 +0000 (UTC) X-Inumbo-ID: 99f68856-105d-11ea-b155-bc764e2007e4 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1574780479; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version; bh=XTpne13jZyXChoxke6JgMqInbZkzpylkc23MV2INAss=; b=KdwGcSfJ/wKb6lHUTrPlJZ0621D4au3b5AgnnZQPIi6+sm6sk5mlrkz/ Cj+k6JCRo0iGeUTW3qaV7+G/jA13JFfMuZz26xqE8mvsUSN3lZ27Sme7i TPD9XQJLb9St9IWjlMRDWx3/k/l+nfHBqBDyZZ6iEuAmauDNv//fqQUaj E=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=andrew.cooper3@citrix.com; spf=Pass smtp.mailfrom=Andrew.Cooper3@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of andrew.cooper3@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="andrew.cooper3@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa6.hc3370-68.iphmx.com: domain of Andrew.Cooper3@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="Andrew.Cooper3@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: 5H1qi8+vzRiB0AjznJwlApghEBYmPG75kJlGZ17I/wJBLgx1sI3GFWtAsYr5q+4bmlmSMLWHzK al1I/bMedh952yYX49qCpS+mEhJNBKbdx6VNqbFX6A5MJwlaF97j52u/yFGjIofjm45vAcgWfk t7ZqqxSpDrnoz440sP3DGxoALW6vDwj5sYoowGSP2hEBYl7DGACrfs1H+b0nIW6MqUMGPkfVkI /NtiuIYMUas/NJOJ0quvhExIz5tQfM2ZwHSF59mUQajlYXf+AIgwKPhzUg3pPqSAJn5jvpRgem 3jg= X-SBRS: 2.7 X-MesageID: 9263889 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.69,246,1571716800"; d="scan'208";a="9263889" From: Andrew Cooper To: Xen-devel Date: Tue, 26 Nov 2019 15:01:11 +0000 Message-ID: <20191126150112.12704-2-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20191126150112.12704-1-andrew.cooper3@citrix.com> References: <20191126150112.12704-1-andrew.cooper3@citrix.com> MIME-Version: 1.0 Subject: [Xen-devel] [PATCH 1/2] AMD/IOMMU: Always print IOMMU errors X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Juergen Gross , Andrew Cooper , Jan Beulich Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Unhandled IOMMU errors (i.e. not IO_PAGE_FAULT) should still be printed, and not hidden behind iommu=3Ddebug. While adjusting this, factor out the symbolic name handling to just one location exposing its off-by-one nature. Signed-off-by: Andrew Cooper Acked-by: Jan Beulich Reviewed-by: Roger Pau Monn=C3=A9 --- CC: Jan Beulich CC: Juergen Gross --- xen/drivers/passthrough/amd/iommu_init.c | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/xen/drivers/passthrough/amd/iommu_init.c b/xen/drivers/passthr= ough/amd/iommu_init.c index 16e84d43d4..8aa8788797 100644 --- a/xen/drivers/passthrough/amd/iommu_init.c +++ b/xen/drivers/passthrough/amd/iommu_init.c @@ -530,6 +530,7 @@ static void parse_event_log_entry(struct amd_iommu *iom= mu, u32 entry[]) EVENT_STR(INVALID_DEV_REQUEST) #undef EVENT_STR }; + const char *code_str =3D "event"; =20 code =3D get_field_from_reg_u32(entry[1], IOMMU_EVENT_CODE_MASK, IOMMU_EVENT_CODE_SHIFT); @@ -553,6 +554,10 @@ static void parse_event_log_entry(struct amd_iommu *io= mmu, u32 entry[]) IOMMU_EVENT_CODE_SHIFT); } =20 + /* Look up the symbolic name for code. */ + if ( code <=3D ARRAY_SIZE(event_str) ) + code_str =3D event_str[code - 1]; + if ( code =3D=3D IOMMU_EVENT_IO_PAGE_FAULT ) { device_id =3D iommu_get_devid_from_event(entry[0]); @@ -566,7 +571,7 @@ static void parse_event_log_entry(struct amd_iommu *iom= mu, u32 entry[]) printk(XENLOG_ERR "AMD-Vi: " "%s: domain =3D %d, device id =3D %#x, " "fault address =3D %#"PRIx64", flags =3D %#x\n", - event_str[code-1], domain_id, device_id, *addr, flags); + code_str, domain_id, device_id, *addr, flags); =20 for ( bdf =3D 0; bdf < ivrs_bdf_entries; bdf++ ) if ( get_dma_requestor_id(iommu->seg, bdf) =3D=3D device_id ) @@ -574,12 +579,8 @@ static void parse_event_log_entry(struct amd_iommu *io= mmu, u32 entry[]) PCI_DEVFN2(bdf)); } else - { - AMD_IOMMU_DEBUG("%s %08x %08x %08x %08x\n", - code <=3D ARRAY_SIZE(event_str) ? event_str[code -= 1] - : "event", - entry[0], entry[1], entry[2], entry[3]); - } + printk(XENLOG_ERR "%s %08x %08x %08x %08x\n", + code_str, entry[0], entry[1], entry[2], entry[3]); =20 memset(entry, 0, IOMMU_EVENT_LOG_ENTRY_SIZE); } --=20 2.11.0 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Thu Apr 25 00:48:46 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=citrix.com ARC-Seal: i=1; a=rsa-sha256; t=1574780564; cv=none; d=zohomail.com; s=zohoarc; b=EcfEslPRtrqjrIRCyAU+yLSzbKIiLGDFxk7GqzG3bieF0g9WQrOrY9B0y8fOXRnBJmreLTOTDJtAH5Km/kyBuZI5orE2jSDVd5OKGijLI8MZnyRQeV9udqcJ2YQqwLWQ9ApEGRLvLGAnXaK//MlVkMr57b28qh9AY21GUkIF/Bw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1574780564; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To; bh=iCSV3Yau3LJKT+zdTqy+2UNlDaqhvTt3HPmXCXXVHBE=; b=A15IWw7LpZ9t3/LuNt5oyJ4AsrrK2so9zN1w5i5wj0bY0UrI/kYVA8lsMYJLe/dOm3SGbLCDAIub4bgk6EBYjatUZp1VGyylhGXoSp32WdpbPzUZBzxj0bb0CEEtd66DRTpVNLUNrzuqMXPTGE81XPFaq0kCkYJ6PGRXgFDfUk8= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=fail; spf=none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1574780564321547.3677109212613; Tue, 26 Nov 2019 07:02:44 -0800 (PST) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iZcLI-0004fW-5I; Tue, 26 Nov 2019 15:01:28 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1iZcLH-0004fM-CB for xen-devel@lists.xenproject.org; Tue, 26 Nov 2019 15:01:27 +0000 Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 9aa26f22-105d-11ea-b155-bc764e2007e4; Tue, 26 Nov 2019 15:01:20 +0000 (UTC) X-Inumbo-ID: 9aa26f22-105d-11ea-b155-bc764e2007e4 DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1574780480; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version; bh=HNlKx18vjebKMmIi8xn45ZqgWiMS9KAO5NsQ8yvRUkc=; b=SB9c0uTCKYO7DCobWLrVpCJiAlbDQ+ESfGZRfk5ejDvOTogFM4NTqX0B uP8DI7B1MPRf0BFvG8bwgBxJu++f/Wxy1gVFFGURtqGdg9vHV3FHh6nHU g7PhOIkvILvlEXhDeTGU8CNVMMRt10tCPDRQPukpcw9Vw166c8cO1rcA3 k=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=andrew.cooper3@citrix.com; spf=Pass smtp.mailfrom=Andrew.Cooper3@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: none (zohomail.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of andrew.cooper3@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="andrew.cooper3@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa6.hc3370-68.iphmx.com: domain of Andrew.Cooper3@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="Andrew.Cooper3@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="Andrew.Cooper3@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: UxL7Gm3yInMccSq9i1bCAzHmOBBj0ZXVkp5VvejHpkPkeDeX9tyd+jxtO2doxORe+7MLBsEHCt SHmkShHCDeaMrLu11A1HZErUrqKtu7pEYwlXdipnlMOq9gjU2i6Zwb1cY0yQXePVejP4TVxlLe cDakyEaNBZqiaX0vUqIdd/M47NPr+c1SAZABSJlq6i+yW45q4Emp+l83xs97tnaTSbpBQlHegE pNscz5gqQPvf08FFrt3nlOUIBCNnQXUGONvWCZz4P4oTimhhoFjs2bu33sv6gfId7+EJc8t836 wYw= X-SBRS: 2.7 X-MesageID: 9263891 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.69,246,1571716800"; d="scan'208";a="9263891" From: Andrew Cooper To: Xen-devel Date: Tue, 26 Nov 2019 15:01:12 +0000 Message-ID: <20191126150112.12704-3-andrew.cooper3@citrix.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20191126150112.12704-1-andrew.cooper3@citrix.com> References: <20191126150112.12704-1-andrew.cooper3@citrix.com> MIME-Version: 1.0 Subject: [Xen-devel] [PATCH 2/2] AMD/IOMMU: Render IO_PAGE_FAULT errors in a more useful manner X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Juergen Gross , Andrew Cooper , Jan Beulich Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Print the PCI coordinates in its common format and use d%u notation for the domain. As well as printing flags, decode them. IO_PAGE_FAULT is used for interrupt remapping errors as well as DMA remapping errors. Before: (XEN) AMD-Vi: IO_PAGE_FAULT: domain =3D 0, device id =3D 0xa1, fault addr= ess =3D 0xbf695000, flags =3D 0x10 (XEN) AMD-Vi: IO_PAGE_FAULT: domain =3D 0, device id =3D 0xa1, fault addr= ess =3D 0xbf695040, flags =3D 0x10 (XEN) AMD-Vi: IO_PAGE_FAULT: domain =3D 0, device id =3D 0xa1, fault addr= ess =3D 0xfffffff0, flags =3D 0x30 (XEN) AMD-Vi: IO_PAGE_FAULT: domain =3D 0, device id =3D 0xa1, fault addr= ess =3D 0x100000000, flags =3D 0x30 (XEN) AMD-Vi: IO_PAGE_FAULT: domain =3D 0, device id =3D 0xa1, fault addr= ess =3D 0x100000040, flags =3D 0x30 After: (XEN) AMD-Vi: IO_PAGE_FAULT: 0000:00:14.1 d0 addr 00000000bf5fc000 flags = 0x10 PR (XEN) AMD-Vi: IO_PAGE_FAULT: 0000:00:14.1 d0 addr 00000000bf5fc040 flags = 0x10 PR (XEN) AMD-Vi: IO_PAGE_FAULT: 0000:00:14.1 d0 addr 00000000fffffff0 flags = 0x30 RW PR (XEN) AMD-Vi: IO_PAGE_FAULT: 0000:00:14.1 d0 addr 0000000100000000 flags = 0x30 RW PR (XEN) AMD-Vi: IO_PAGE_FAULT: 0000:00:14.1 d0 addr 0000000100000040 flags = 0x30 RW PR No functional change. Signed-off-by: Andrew Cooper Acked-by: Jan Beulich Reviewed-by: Roger Pau Monn=C3=A9 --- CC: Jan Beulich CC: Juergen Gross --- xen/drivers/passthrough/amd/iommu_init.c | 35 +++++++++++++++--------= ---- xen/include/asm-x86/hvm/svm/amd-iommu-proto.h | 3 --- 2 files changed, 20 insertions(+), 18 deletions(-) diff --git a/xen/drivers/passthrough/amd/iommu_init.c b/xen/drivers/passthr= ough/amd/iommu_init.c index 8aa8788797..cd4e6e16b8 100644 --- a/xen/drivers/passthrough/amd/iommu_init.c +++ b/xen/drivers/passthrough/amd/iommu_init.c @@ -513,10 +513,7 @@ static hw_irq_controller iommu_x2apic_type =3D { =20 static void parse_event_log_entry(struct amd_iommu *iommu, u32 entry[]) { - u16 domain_id, device_id, flags; - unsigned int bdf; u32 code; - u64 *addr; int count =3D 0; static const char *const event_str[] =3D { #define EVENT_STR(name) [IOMMU_EVENT_##name - 1] =3D #name @@ -560,18 +557,26 @@ static void parse_event_log_entry(struct amd_iommu *i= ommu, u32 entry[]) =20 if ( code =3D=3D IOMMU_EVENT_IO_PAGE_FAULT ) { - device_id =3D iommu_get_devid_from_event(entry[0]); - domain_id =3D get_field_from_reg_u32(entry[1], - IOMMU_EVENT_DOMAIN_ID_MASK, - IOMMU_EVENT_DOMAIN_ID_SHIFT); - flags =3D get_field_from_reg_u32(entry[1], - IOMMU_EVENT_FLAGS_MASK, - IOMMU_EVENT_FLAGS_SHIFT); - addr=3D (u64*) (entry + 2); - printk(XENLOG_ERR "AMD-Vi: " - "%s: domain =3D %d, device id =3D %#x, " - "fault address =3D %#"PRIx64", flags =3D %#x\n", - code_str, domain_id, device_id, *addr, flags); + unsigned int bdf; + uint16_t device_id =3D MASK_EXTR(entry[0], IOMMU_CMD_DEVICE_ID_MAS= K); + uint16_t domain_id =3D MASK_EXTR(entry[1], IOMMU_EVENT_DOMAIN_ID_M= ASK); + uint16_t flags =3D MASK_EXTR(entry[1], IOMMU_EVENT_FLAGS_MASK); + uint64_t addr =3D *(uint64_t *)(entry + 2); + + printk(XENLOG_ERR "AMD-Vi: %s: %04x:%02x:%02x.%u d%d addr %016"PRI= x64 + " flags %#x%s%s%s%s%s%s%s%s%s%s\n", + code_str, iommu->seg, PCI_BUS(device_id), PCI_SLOT(device_i= d), + PCI_FUNC(device_id), domain_id, addr, flags, + (flags & 0xe00) ? " ??" : "", + (flags & 0x100) ? " TR" : "", + (flags & 0x080) ? " RZ" : "", + (flags & 0x040) ? " PE" : "", + (flags & 0x020) ? " RW" : "", + (flags & 0x010) ? " PR" : "", + (flags & 0x008) ? " I" : "", + (flags & 0x004) ? " US" : "", + (flags & 0x002) ? " NX" : "", + (flags & 0x001) ? " GN" : ""); =20 for ( bdf =3D 0; bdf < ivrs_bdf_entries; bdf++ ) if ( get_dma_requestor_id(iommu->seg, bdf) =3D=3D device_id ) diff --git a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h b/xen/include/as= m-x86/hvm/svm/amd-iommu-proto.h index 8ed9482791..53900cd60c 100644 --- a/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h +++ b/xen/include/asm-x86/hvm/svm/amd-iommu-proto.h @@ -265,9 +265,6 @@ static inline uint32_t iommu_get_addr_hi_from_cmd(uint3= 2_t cmd) IOMMU_CMD_ADDR_HIGH_SHIFT); } =20 -/* access address field from event log entry */ -#define iommu_get_devid_from_event iommu_get_devid_from_cmd - /* access iommu base addresses field from mmio regs */ static inline void iommu_set_addr_lo_to_reg(uint32_t *reg, uint32_t addr) { --=20 2.11.0 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel